CN113037734B - Service state monitoring method and system for isolated network - Google Patents

Service state monitoring method and system for isolated network Download PDF

Info

Publication number
CN113037734B
CN113037734B CN202110228158.4A CN202110228158A CN113037734B CN 113037734 B CN113037734 B CN 113037734B CN 202110228158 A CN202110228158 A CN 202110228158A CN 113037734 B CN113037734 B CN 113037734B
Authority
CN
China
Prior art keywords
monitored
hash value
monitoring
isolated network
alarm
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202110228158.4A
Other languages
Chinese (zh)
Other versions
CN113037734A (en
Inventor
南晓斌
赵高
唐家辉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Dexiaoyi Information Technology Co.,Ltd.
Original Assignee
Shanghai Deyi Car Information Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Deyi Car Information Technology Co ltd filed Critical Shanghai Deyi Car Information Technology Co ltd
Priority to CN202110228158.4A priority Critical patent/CN113037734B/en
Publication of CN113037734A publication Critical patent/CN113037734A/en
Application granted granted Critical
Publication of CN113037734B publication Critical patent/CN113037734B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions

Abstract

The invention provides a service state monitoring method and a system of an isolation network, comprising the following steps: a monitoring end located in a non-isolated network area acquires a hash value of an object to be monitored located in an isolated network area; the monitoring end judges whether the object to be monitored changes or not according to the hash value and a pre-stored previous hash value of the object to be monitored; and if the object to be monitored is judged to be changed, sending out a corresponding alarm instruction. The invention can automatically monitor the service of the network isolation area by acquiring the hash value of the object to be monitored without directly acquiring the original monitoring data, and simultaneously meets the safety requirement of the network isolation area.

Description

Service state monitoring method and system for isolated network
Technical Field
The present invention relates to the field of service monitoring technologies, and in particular, to a method and a system for monitoring service states of an isolated network.
Background
Due to service requirements, certain services which have very high requirements on information security are arranged in an isolated network area, and direct communication with an external network is forbidden. The service state monitoring of the isolated network area generally needs to manually check data through bastion machine verification and a login platform background, and once the data changes, the data needs to be processed immediately.
For example, the third-party server may send some data to the service network in the isolated network region from time to time through the private line, so that a page picture of a browser seen by the client in the isolated network region changes, which may indicate that the input changes, and corresponding backend processing needs to be adjusted accordingly. Therefore, after the change is detected, a person needs to go to the service network to perform corresponding processing.
However, the client side located in the isolated network area is inspected manually and periodically, firstly, the operation is complex, the service state change cannot be found quickly and timely, and secondly, the omission exists in manual inspection, so that an automatic monitoring scheme is sought.
For safety reasons, the monitoring system located in the non-isolated network region cannot directly acquire the service raw data of the isolated network region. However, the windows platform monitoring system on the market at present cannot monitor under the condition that monitoring data cannot be directly acquired, so that it is necessary to design a monitoring system which can meet the monitoring requirement and the service safety requirement of an isolated network area.
Disclosure of Invention
One of the objectives of the present invention is to provide a method and a system for monitoring a service status of an isolated network to overcome at least one of the disadvantages in the prior art.
The technical scheme provided by the invention is as follows:
a method for monitoring service state of an isolation network comprises the following steps: a monitoring end positioned in a non-isolated network area acquires a hash value of an object to be monitored positioned in an isolated network area; the monitoring end judges whether the object to be monitored changes or not according to the hash value and a pre-stored previous hash value of the object to be monitored; and if the object to be monitored is judged to be changed, sending out a corresponding alarm instruction.
Further, before the monitoring end located in the non-isolated network region obtains the hash value of the object to be monitored located in the isolated network region, the method includes: the client side located in the isolated network area actively acquires the object to be monitored, or acquires the object to be monitored according to the received instruction of the monitoring side; and the client calculates the hash value of the object to be monitored according to a preset algorithm, and outputs the hash value of the object to be monitored to the monitoring end through the bastion machine.
Furthermore, the object to be monitored is a picture which is located in a preset area and can reflect the service state of the isolated network.
Further, the step of judging, by the monitoring terminal, whether the object to be monitored changes according to the hash value and a pre-stored hash value of the object to be monitored, includes: the monitoring end calculates the Hamming distance between the hash value and the previous hash value; and if the Hamming distance is larger than a first preset value, judging that the object to be monitored changes.
Further, the issuing of the corresponding alarm indication includes: and the monitoring end eliminates the alarm after receiving the alarm confirmation, and updates the previous hash value of the object to be monitored by using the hash value.
Further, said issuing a corresponding alarm indication comprises: and sending an alarm instruction to a related responsible person in a short message, weChat, nail and mail mode.
The invention also provides a service state monitoring system of the isolated network, which comprises: the system comprises a monitoring end and a bastion machine which are positioned in a non-isolated network area; the bastion machine is used for carrying out security verification on the interactive information between the monitoring end and the isolated network; the monitoring end comprises: the first acquisition module is used for acquiring the hash value of the object to be monitored of the isolated network through the bastion machine; the judging module is used for judging whether the object to be monitored changes or not according to the hash value and a pre-stored previous hash value of the object to be monitored; and the alarm module is used for sending out a corresponding alarm instruction if the object to be monitored is judged to be changed.
Further, the system also comprises a client end positioned in the isolation network area; the client comprises: the second acquisition module is used for actively acquiring the object to be monitored or acquiring the object to be monitored according to the received instruction of the monitoring end; the calculation module is used for calculating the hash value of the object to be monitored according to a preset algorithm; and the output module is used for outputting the hash value of the object to be monitored to the monitoring end through the bastion machine.
Further, the judging module of the monitoring end is further configured to calculate a hamming distance between the hash value and the previous hash value; and if the Hamming distance is larger than a first preset value, judging that the object to be monitored changes.
Further, the monitoring terminal further comprises: the alarm elimination module is used for eliminating the alarm after receiving the alarm confirmation; and the updating module is used for updating the hash value to the previous hash value of the object to be monitored.
The method and the system for monitoring the service state of the isolated network provided by the invention can at least bring the following beneficial effects: by acquiring the hash value of the object to be monitored, the monitoring end can automatically monitor the service of the network isolation area without directly acquiring the original monitoring data, and simultaneously, the safety requirement of the network isolation area is met.
Drawings
The above features, technical features, advantages and implementations of a method and system for monitoring traffic status of an isolated network will be further described in the following detailed description of preferred embodiments with reference to the accompanying drawings.
FIG. 1 is a flow chart of one embodiment of a traffic status monitoring method of an isolated network of the present invention;
fig. 2 is a schematic structural diagram of an embodiment of a traffic status monitoring system of an isolated network according to the present invention.
Detailed Description
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the following description will be made with reference to the accompanying drawings. It is obvious that the drawings in the following description are only some examples of the invention, and that for a person skilled in the art, other drawings and embodiments can be derived from them without inventive effort.
For the sake of simplicity, the drawings only schematically show the parts relevant to the present invention, and they do not represent the actual structure as a product. In addition, in order to make the drawings concise and understandable, components having the same structure or function in some of the drawings are only schematically depicted, or only one of them is labeled. In this document, "one" means not only "only one" but also a case of "more than one".
An embodiment of the present invention, as shown in fig. 1, is a method for monitoring a service state of an isolated network, including:
step S100, the client in the isolated network region actively acquires the object to be monitored, or acquires the object to be monitored according to the received instruction from the monitoring terminal in the non-isolated network region.
Specifically, the monitoring end is located in a non-isolated network area, the client is located in an isolated network area, and the monitoring end regularly and automatically monitors the service state of the client through the bastion machine.
The object to be monitored can reflect the service state of the isolated network. The object to be monitored may be a file or a picture in a preset area, such as a page picture (a desktop picture) of a browser at a client, or a picture in a preset area, or a file in a preset area.
The client can actively acquire the object to be monitored at regular time, or the monitoring end can send a monitoring instruction command to the client at regular time, and the client acquires the object to be monitored after receiving the command.
Assuming that the object to be monitored is a desktop picture of the client, the client can automatically intercept the picture with the specified size of the desktop after starting and store the picture; or intercepting the pictures with the specified size of the desktop after receiving the indication command from the monitoring end.
And S200, the client calculates the hash value of the object to be monitored according to a preset algorithm, and outputs the hash value of the object to be monitored to the monitoring end through the bastion machine.
The preset algorithm is a hash (hash) algorithm which can be MD5, SHA-1, perceptual hash algorithm and the like. A long piece of data can be mapped to a short small piece of data by a hash algorithm, and the short piece of data is a hash value of the large data. For example, suppose that the object to be monitored is a 384 × 384 picture, the hash algorithm may map to a 64-bit hash value, and the hash value is identification information of the picture, such as an identity number of a person.
The hash value of the picture is output to the monitoring end, so that the monitoring end can be prevented from contacting the original data (namely plaintext) of the object to be monitored, and the safety requirement of an isolated network area is met.
Step S300, the monitoring terminal obtains the hash value of the object to be monitored positioned in the isolated network area.
The client side can actively output the hash value of the object to be monitored to the monitoring side, or send a monitoring instruction command to the client side by the monitoring side, and the client side feeds back the hash value of the object to be monitored to the monitoring side after receiving the command.
Step S400, the monitoring terminal judges whether the object to be monitored changes according to the similarity between the hash value and the hash value which is stored in advance and is in front of the object to be monitored.
In one embodiment, the monitoring end determines whether the received hash value is the same as a previously stored previous hash value, and if not, the object to be monitored is considered to have changed.
In another embodiment, the monitoring end calculates the hamming distance between the received hash value and the previously saved previous hash value. And if the Hamming distance is greater than the first preset value, the object to be monitored is considered to be changed. The first preset value can be set as desired.
Step S500, if the object to be monitored is judged to be changed, a corresponding alarm indication is sent out.
And the alarm indication can be sent to the related responsible person by means of short message, weChat, nail, mail and the like.
And step S600, the monitoring terminal eliminates the alarm after receiving the alarm confirmation and updates the previous hash value of the object to be monitored by the hash value.
And after the monitoring end sends an alarm instruction, the related responsible person carries out alarm processing, and the monitoring end automatically eliminates the alarm after receiving the alarm confirmation instruction.
Aiming at the scenes that the changes of the object to be monitored all belong to normal changes, after the alarm is eliminated, the stored previous hash value can be updated by using the received hash value. If the change of the object to be monitored has a scene with abnormal change, the hash value can be updated according to the indication.
In this embodiment, by obtaining the ciphertext, such as the hash value, of the object to be monitored, the monitoring end can automatically monitor the service in the network isolation area without directly obtaining the original monitoring data, and the security requirement of the network isolation area is met.
One embodiment of the present invention, as shown in fig. 2, is a traffic state monitoring system of an isolated network, which includes a monitoring terminal 100 located in a non-isolated network region, a bastion machine 200, and a client 300 located in an isolated network region.
The client 300 includes:
the second obtaining module 310 is configured to actively obtain the object to be monitored, or obtain the object to be monitored according to the received instruction of the monitoring end.
Specifically, the monitoring end is located in a non-isolated network area, the client is located in an isolated network area, and the monitoring end automatically monitors the service state of the client regularly through the bastion machine.
The object to be monitored can reflect the service state of the isolated network. The object to be monitored may be a file or a picture located in a preset area, such as a desktop picture of a client, or a picture of a certain preset area, or a file of a certain preset area, and the like.
The client can actively acquire the object to be monitored at regular time, or the monitoring end can send a monitoring instruction command to the client at regular time, and the client acquires the object to be monitored after receiving the command.
The calculating module 320 is configured to calculate a hash value of the object to be monitored according to a preset algorithm.
The preset algorithm is a hash algorithm, and can be MD5, SHA-1, etc. A long piece of data can be mapped to a short piece of small data by a hash algorithm, and the small piece of data is a hash value of large data. For example, assuming that the object to be monitored is a 384 × 384 picture, the hash algorithm may map to a 64-bit hash value, and the hash value is identification information of the picture.
And the output module 330 is configured to output the hash value of the object to be monitored to the monitoring end through the bastion machine.
The hash value of the picture is output to the monitoring end, so that the monitoring end can be prevented from contacting the original data (namely the plaintext) of the object to be monitored, and the safety requirement of the isolated network area is met.
The monitoring terminal 100 includes:
the first obtaining module 110 is configured to obtain, by using the bastion machine, a hash value of the object to be monitored located in the isolated network area.
The client side can actively output the hash value of the object to be monitored to the monitoring side, or send a monitoring instruction command to the client side by the monitoring side, and the client side feeds back the hash value of the object to be monitored to the monitoring side after receiving the command.
The determining module 120 is configured to determine whether the object to be monitored changes according to the similarity between the hash value and a hash value of a pre-stored object to be monitored.
In one embodiment, the determining module determines whether the received hash value is the same as a previously stored previous hash value, and if not, determines that the object to be monitored has changed.
In another embodiment, the determining module is configured to calculate a hamming distance between the received hash value and a previously stored previous hash value. And if the Hamming distance is greater than the first preset value, the object to be monitored is considered to be changed. The first preset value can be set as required.
And an alarm module 130, configured to send a corresponding alarm indication if it is determined that the object to be monitored changes. And the alarm indication can be sent to related responsible persons by means of short messages, weChat, nails, mails and the like.
And an alarm elimination module 140 for eliminating the alarm after receiving the alarm confirmation.
And after the monitoring end sends an alarm instruction, the related responsible person carries out alarm processing, and the monitoring end automatically eliminates the alarm after receiving the alarm confirmation instruction.
And the updating module 150 is configured to update the previous hash value of the object to be monitored with the received hash value.
And aiming at the scene that the change of the object to be monitored belongs to normal change, after the alarm is eliminated, the stored previous hash value can be updated by using the received hash value. If the change of the object to be monitored has a scene with abnormal change, the hash value can be updated according to the indication.
In this embodiment, by obtaining the ciphertext, such as the hash value, of the object to be monitored, the monitoring end can automatically monitor the service in the network isolation area without directly obtaining the original monitoring data, and the security requirement of the network isolation area is met.
It should be noted that, the embodiment of the service status monitoring system for an isolated network provided by the present invention and the embodiment of the service status monitoring method for an isolated network provided by the foregoing are all based on the same inventive concept, and can obtain the same technical effects. Therefore, other specific contents of the embodiment of the traffic state monitoring system for the isolated network may refer to the description of the content of the embodiment of the traffic state monitoring method applied to the isolated network.
The invention also provides a specific implementation scenario example, the method and the system for monitoring the service state of the isolated network provided by the application are applied to the service monitoring of the isolated network, and automatic screen capture monitoring is adopted, and a flow chart is shown in fig. 3 and specifically comprises the following steps:
the monitoring system consists of a client, a server (namely a monitoring end) and an alarm program.
Step 1, loading a configuration file after a client is started, automatically and regularly intercepting a picture with a specified size on a desktop, and calculating the picture through a perceptual hash algorithm (PHA for short) after the picture is successfully intercepted to obtain a corresponding hash value.
Perceptual hashing algorithms may generate a fingerprint (i.e., a hash value) for a picture based on the features that the picture contains. And subsequently, the comparison of the pictures can be carried out according to the fingerprints of the pictures.
And 2, the server regularly checks whether the client program and the machine are normal (such as through ping, port check or health interface detection), and regularly acquires the hash value calculated by the client from the client.
And 3, the server calculates the Hamming distance between the obtained hash value and the original image hash value, and stores the Hamming distance calculation value, wherein the smaller the value is, the higher the similarity of the two pictures is.
And 4, configuring a trigger rule by the server, and if the hamming distance calculation value is found to be larger than a preset threshold, such as 0.01, namely the image similarity is smaller than 99%, judging that the data of the monitoring page is changed, and meeting the trigger rule to trigger alarm.
And 5, confirming the alarm by the responsible person in the monitoring system, automatically updating the hash value recently acquired by the client into the original image hash value by the system after the alarm is eliminated, and continuously triggering the alarm when the page is changed again.
And 6, after the alarm is triggered, the alarm program can also realize sending alarm notifications in the modes of short messages, weChat, nails, mails and the like.
Optionally, in step 7, the server acquires a changed picture from the client after determining that the monitoring page is changed, uploads the picture to the IMS system, encrypts the picture through a proprietary algorithm, and stores the encrypted picture in the IMS system.
In this embodiment, by transmitting the hash value of the page to be monitored, the server can automatically monitor the service in the network isolation area without directly acquiring the original monitoring data, and the security requirement of the network isolation area is met.
It should be noted that the above embodiments can be freely combined as necessary. The foregoing is only a preferred embodiment of the present invention, and it should be noted that, for those skilled in the art, various modifications and decorations can be made without departing from the principle of the present invention, and these modifications and decorations should also be regarded as the protection scope of the present invention.

Claims (9)

1. A service state monitoring method of an isolated network is used for a monitoring system, the monitoring system comprises a monitoring terminal located in a non-isolated network area, a bastion machine for carrying out security verification on interaction information between the monitoring terminal and the isolated network and a client terminal located in the isolated network area, and is characterized by comprising the following steps:
the client acquires an object to be monitored positioned in an isolated network area; the object to be monitored is a picture which is positioned in a preset area and can reflect the service state of the isolation network;
the client calculates the hash value of the object to be monitored according to a preset algorithm, takes the hash value as the ciphertext of the object to be monitored, and outputs the ciphertext to the monitoring end through the bastion machine;
the monitoring end obtains the hash value of the object to be monitored;
the monitoring end judges whether the object to be monitored changes or not according to the hash value and a pre-stored previous hash value of the object to be monitored;
and if the object to be monitored is judged to be changed, sending out a corresponding alarm instruction.
2. The service status monitoring method according to claim 1, wherein the client acquires the object to be monitored located in the isolated network area, and the method includes:
and the client actively acquires the object to be monitored, or acquires the object to be monitored according to the received instruction of the monitoring terminal.
3. The method for monitoring the service status according to claim 1, wherein the step of the monitoring end determining whether the object to be monitored changes according to the hash value and a pre-stored hash value of the object to be monitored includes:
the monitoring end calculates the Hamming distance between the hash value and the previous hash value;
and if the Hamming distance is larger than a first preset value, judging that the object to be monitored changes.
4. The traffic status monitoring method according to claim 1, wherein said issuing of the corresponding alarm indication comprises:
and the monitoring end eliminates the alarm after receiving the alarm confirmation, and updates the previous hash value of the object to be monitored by using the hash value.
5. The traffic status monitoring method according to claim 1, wherein the issuing of the corresponding alarm indication comprises:
and sending an alarm indication to a related responsible person in a short message, weChat, nail and mail mode.
6. A service state monitoring system of an isolated network is characterized by comprising a monitoring end positioned in a non-isolated network area, a bastion machine and a client positioned in an isolated network area;
the bastion machine is used for carrying out security verification on the interactive information between the monitoring end and the isolation network;
the monitoring terminal comprises:
the first acquisition module is used for acquiring the hash value of the object to be monitored of the isolated network through the bastion machine;
the judging module is used for judging whether the object to be monitored changes or not according to the hash value and a pre-stored previous hash value of the object to be monitored;
the alarm module is used for sending out a corresponding alarm instruction if the object to be monitored is judged to be changed;
the client comprises:
the second acquisition module is used for acquiring the object to be monitored; the object to be monitored is a picture which is positioned in a preset area and can reflect the service state of the isolation network;
the calculation module is used for calculating the hash value of the object to be monitored according to a preset algorithm;
and the output module is used for taking the hash value as the ciphertext of the object to be monitored and outputting the ciphertext to the monitoring end through the bastion machine.
7. Traffic status monitoring system according to claim 6,
the second obtaining module is further configured to actively obtain the object to be monitored, or obtain the object to be monitored according to the received instruction of the monitoring end.
8. The traffic status monitoring system according to claim 6, wherein:
the judging module of the monitoring end is also used for calculating the Hamming distance between the hash value and the previous hash value; and if the Hamming distance is larger than a first preset value, judging that the object to be monitored changes.
9. The traffic status monitoring system according to claim 6, wherein the monitoring end further comprises:
the alarm eliminating module is used for eliminating the alarm after receiving the alarm confirmation;
and the updating module is used for updating the hash value to the previous hash value of the object to be monitored.
CN202110228158.4A 2021-03-02 2021-03-02 Service state monitoring method and system for isolated network Active CN113037734B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110228158.4A CN113037734B (en) 2021-03-02 2021-03-02 Service state monitoring method and system for isolated network

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110228158.4A CN113037734B (en) 2021-03-02 2021-03-02 Service state monitoring method and system for isolated network

Publications (2)

Publication Number Publication Date
CN113037734A CN113037734A (en) 2021-06-25
CN113037734B true CN113037734B (en) 2022-11-04

Family

ID=76465218

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110228158.4A Active CN113037734B (en) 2021-03-02 2021-03-02 Service state monitoring method and system for isolated network

Country Status (1)

Country Link
CN (1) CN113037734B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113542068B (en) * 2021-07-15 2022-12-23 中国银行股份有限公司 Redis multi-instance monitoring system and method

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102811213A (en) * 2011-11-23 2012-12-05 北京安天电子设备有限公司 Fuzzy hashing algorithm-based malicious code detection system and method
CN107391298A (en) * 2017-07-06 2017-11-24 上海策链信息科技有限公司 State data memory detection method, device and computer-readable recording medium
CN108809467A (en) * 2018-05-22 2018-11-13 深圳华博高科光电技术有限公司 Monitor the method, apparatus and computer readable storage medium of picture certification
CN109191197A (en) * 2018-08-24 2019-01-11 陕西优米数据技术有限公司 Video passenger flow statistical analysis based on block chain technology
CN111078507A (en) * 2019-12-27 2020-04-28 广州三七互娱科技有限公司 Data monitoring method, system, computer equipment and storage medium
CN111090655A (en) * 2019-12-27 2020-05-01 北京明略软件系统有限公司 Early warning method and device based on monitoring data, electronic equipment and storage medium

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103647659A (en) * 2013-11-28 2014-03-19 广州市维能达软件科技有限公司 Monitoring method and system

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102811213A (en) * 2011-11-23 2012-12-05 北京安天电子设备有限公司 Fuzzy hashing algorithm-based malicious code detection system and method
CN107391298A (en) * 2017-07-06 2017-11-24 上海策链信息科技有限公司 State data memory detection method, device and computer-readable recording medium
CN108809467A (en) * 2018-05-22 2018-11-13 深圳华博高科光电技术有限公司 Monitor the method, apparatus and computer readable storage medium of picture certification
CN109191197A (en) * 2018-08-24 2019-01-11 陕西优米数据技术有限公司 Video passenger flow statistical analysis based on block chain technology
CN111078507A (en) * 2019-12-27 2020-04-28 广州三七互娱科技有限公司 Data monitoring method, system, computer equipment and storage medium
CN111090655A (en) * 2019-12-27 2020-05-01 北京明略软件系统有限公司 Early warning method and device based on monitoring data, electronic equipment and storage medium

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
基于安卓的远程智能监控系统设计;古静等;《软件导刊》;20180515(第05期);全文 *

Also Published As

Publication number Publication date
CN113037734A (en) 2021-06-25

Similar Documents

Publication Publication Date Title
US20210312739A1 (en) Facial capture managing access to resources by a device
EP3905671B1 (en) Method and device for processing request
CN108234171B (en) Data processing method, system and device
WO2017008552A1 (en) Multimedia information popup window processing method and device, and computer storage medium
US20190297089A1 (en) On Premises Peer to Peer Credential Validation System and Method of Operation
CN105825409B (en) Electronic invoice message pushing system and method
US20200026837A1 (en) Face authentication system, face authentication method, biometrics authentication system, biometrics authentication method, and storage medium
US20080270520A1 (en) Provision of Personal Data in a Data Communications Network
CN113037734B (en) Service state monitoring method and system for isolated network
US10134249B2 (en) Method and device for sending message
CN105657376A (en) Home-security system and implementation method based on intelligent mobile terminal
CN112559999A (en) Identity authentication method, identity authentication system, electronic device, and storage medium
CN110650097B (en) Data broadcasting method and device and computer readable storage medium
CN112153336A (en) Monitoring method and related equipment
CN113905001A (en) Automatic reply method and device, computer equipment and readable storage medium
US10880735B2 (en) Method for detecting the possible taking of screenshots
CN111507140B (en) Portrait contrast method, system, electronic device and readable storage medium
CN116450176A (en) Version updating method and device, electronic equipment and storage medium
CN111199182A (en) Lost object method, system and storage medium based on intelligent community
KR101820091B1 (en) System and method for broadcasting emergency alarm and application for smart device thereof
CN111565166A (en) File transmission method of work platform for packet
US10122705B2 (en) Intelligent terminal equipment and information transmission method and system using the same
CN110647757A (en) Data processing method based on intelligent contract and related device
KR102608208B1 (en) Method, device and system for providing streaming service with improved visibility of image of interest
US11061778B2 (en) Restoration of a messaging application

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CP03 Change of name, title or address

Address after: 200241 room 025, 13 / F, building 2, 588 Zixing Road, Minhang District, Shanghai

Patentee after: Dexiaoyi Information Technology Co.,Ltd.

Country or region after: China

Address before: 200241 room 025, 13 / F, building 2, 588 Zixing Road, Minhang District, Shanghai

Patentee before: Shanghai Deyi Car Information Technology Co.,Ltd.

Country or region before: China